GPG Key Signing

October Meeting:
GPG Key Signing

This talk will be a short overview of GPG (formerly PGP) followed by a key signing event. This is not meant to be a thorough discussion on GPG, but a quick familiarization talk and an opportunity to get your GPG key signed by other attendees in order to provide you with an initial Web Of Trust.

About the Speaker

Scott has been haunting server rooms and using/administrating Unix and Unix like systems for more than 30 years now. His background includes IT infrastructure, system administration, deployments and migrations, security and management. He is currently working as a consultant for the federal government.

GPG Keysigning

This is more of an activity rather than a talk. In order to participate, you will need a few things:

A previously generated key you plan on using

One, preferably two pieces of picture ID to prove you are who you say you are

Your key information (fingerprint and uid)

Ideally, you should bring small pieces of paper with your name and pgp key fingerprint on them to hand out to people. You can include a small "verified" checkbox that someone can mark if they choose to check identification.

Method:

Generate your fingerprint and paste it into a file

Copy and paste until you have filled a sheet of paper

Cut into strips to hand out.

About the Speaker

Scott has been haunting server rooms and using/administrating Unix and Unix like systems for more than 30 years now. His background includes IT infrastructure, system administration, deployments and migrations, security and management. He is currently working as a consultant for the federal government.